Search on This Topic: News

IT professionals looking to gain computer forensic certification are being offered an accelerated six-day course by the Training Camp. The IT training provider said its course is aimed at e-security experts, police, military personnel, legal professionals and government agencies. It aims to give anyone from an IT manager to a chief security officer the skills to detect, pursue and analyse evidence of computer crime or misuse.

New Hampshireâ€™s state forensic laboratory has become the third in the United States to receive national accreditation for examining digital evidence, including images stored on computer hard-drives. The accreditation was awarded by the American Society of Crime Laboratory Directors, which spent a week in Concord interviewing staff and checking lab policies and procedures...

Researchers from the National Institute of Standards and Technology recently examined a number of software tools designed to acquire information from operating systems used in most PDAs: Palm OS, Microsoft Pocket PC and Linux. The researchers examined the tools in a range of situations commonly encountered during a forensic examination of PDAs. For example, the researchers wanted to determine if tools could find information, including deleted information, associated with applications such as calendars, contacts and task lists. The tools also were examined to see if someone could obtain the user's password and gain access to the contents of the device.

Modern policing puts an emphasis on mental health, said J. Mark Hall, a psychologist with a private practice in Glastonbury. He works with troopers from the state police computer crimes unit. Those officers spend their days trying to lure pedophiles through Internet chat room conversations. Hallâ€™s job is to check up on the troopers and talk about how the work affects them.

"Virtual evidence is an important part of nearly every modern corporate crime investigation, and proper handling of that evidence can mean the difference between a conviction and a criminal walking free. In this chapter, you'll learn how to properly investigate computer evidence in a corporate environment."

The Federal Communications Commission (FCC) on Thursday launched a public comment period on its plan to compel Internet broadband and VoIP providers to open their networks up to easy surveillance by law enforcement agencies.